2019
DOI: 10.1109/jiot.2018.2882588
|View full text |Cite
|
Sign up to set email alerts
|

ERP: Edge Resource Pooling for Data Stream Mobile Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(5 citation statements)
references
References 42 publications
0
5
0
Order By: Relevance
“…In this case, the capacity of the metaverse network will increase without occupying the resources of the cloud server [80]. The authors in [81] have presented an efficient method for sharing resources at the edge of the network in the framework of the resource pool. For a survey of incentive mechanisms for sharing resources at the network edge, see [82].…”
Section: A Metaverse Requirements To Be Met By Edge Computingmentioning
confidence: 99%
“…In this case, the capacity of the metaverse network will increase without occupying the resources of the cloud server [80]. The authors in [81] have presented an efficient method for sharing resources at the edge of the network in the framework of the resource pool. For a survey of incentive mechanisms for sharing resources at the network edge, see [82].…”
Section: A Metaverse Requirements To Be Met By Edge Computingmentioning
confidence: 99%
“…For tractable analysis, we further assume uniform distributions over [0, 1], and denote by g wc (w, c) the joint distribution over (w, c) ∈ [0, 1] × [0, 1]. 4 As we have mentioned, for a particular content, an ED can choose to act as an agent or a requester for obtaining the content, or to act as an alien who does not participate. To specify EDs' choices, we denote by z wc ∈ {AG, RE, NA} the role selection strategy of a type-(w, c) ED, where • z wc = AG: choosing to be an agent for the content; • z wc = RE: choosing to be a requester for the content; • z wc = NA: choosing to be an alien for the content.…”
Section: A Strategy Profile Of Edsmentioning
confidence: 99%
“…Due to the broader usage of IoT devices, endpoints have to meet different bandwidths and latency requirements, depending on their applications [ 1 ]. At the same time, the operating environment for these devices has added new challenges to the design, including more constraints in power consumption, remote accessibility, limited memory, or processing capability [ 2 , 3 ]. These demands can lead to data loss in transmission due to network congestion and dropped packets.…”
Section: Introductionmentioning
confidence: 99%